Get my own profile
Public access
View all27 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jean-Sebastien CoronProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Tancrède LepointApplied Scientist, AmazonVerified email at amazon.com
- Thomas EspitauLead researcher, PQShieldVerified email at pqshield.com
- Akira TakahashiJ.P. Morgan AI Research & AlgoCRYPT CoEVerified email at jpmorgan.com
- Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Avradip MandalZfense LabsVerified email at zfenselabs.com
- Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org
- Yang YuTsinghua UniversityVerified email at mail.tsinghua.edu.cn
- Mélissa RossiANSSIVerified email at ssi.gouv.fr
- Sonia BelaïdCryptoExpertsVerified email at cryptoexperts.com
- Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Craig GentryCTO TripleBlindVerified email at tripleblind.ai
- Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
- Jinsu KimSecurity 2Lab, Software Center, Samsung ElectronicsVerified email at snu.ac.kr
- Aaram YunVerified email at ewha.ac.kr
- Benjamin GregoireInria Sophia-AntipolisVerified email at inria.fr
- Taechan KimNTT Secure Platform LaboratoriesVerified email at snu.ac.kr